• The impact of wireless LAN security on performance for different windows operating systems 

      Kolahi, Samad; Narayan, Shaneel; Nguyen, Du D.T.; Sunarto, Y.; Mani, Paul (Institute of Electrical and Electronics Engineers (IEEE), 2008-07-09)
      This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both ...
    • The Influence of WPA2 Security on the UDP performance of IPv4 and IPv6 Using 802.11n WLAN in Windows 7-Windows 2008 environment 

      Kolahi, Samad; Singla, Hitesh; Ehsan, Mohd Nash; Dong, Clarence (Institute of Electrical and Electronics Engineers (IEEE), 2011-02-16)
      The impact of WPA2 security-bandwidth trade-off for IPv4 and IPv6 on wireless 802.11n network implementing Windows 7-Windows Server 2008 is investigated. The highest point of difference between open system and WPA2 for UDP ...
    • Performance evaluation of virtual private network protocols in Windows 2003 environment 

      Narayan, Shaneel; Kolahi, Samad; Brooking, Kris; de Vere, Simon (Institute of Electrical and Electronics Engineers (IEEE), 2008-12-20)
      Virtual Private Network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses ...
    • Portability of an RF fingerprint of a wireless transmitter 

      Rehman, Saeed; Burki, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
      In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ...
    • Portability of an RF fingerprint of a wireless transmitter 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq; Ardekani, Iman (2014-10)
      In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ...
    • Radio Frequency fingerprinting and its challenges 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
      RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
    • SecTrust : a trust and recommendation system for Peer-2-Peer networks 

      Airehrour, David; Gutierrez, J.; Ray, S. K. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2018-06)
      The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, ...
    • Security in Virtual DMZ designs 

      Sathu, Hira; Komosny, Dan; Singh, S. (Global Business and Technology Association (New York), 2014-07)
      Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized ...
    • A survey on Internet usage and cybersecurity awareness in students 

      Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (2016-12)
      There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ...
    • Taxonomy of malware detection techniques 

      Mohaddes Deylami, Hanif; Muniyandi, R.C.; Ardekani, Iman; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
      Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends ...